An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3021-1 | firefox-esr security update |
![]() |
DLA-3041-1 | thunderbird security update |
![]() |
DSA-5143-1 | firefox-esr security update |
![]() |
DSA-5158-1 | thunderbird security update |
![]() |
EUVD-2022-24827 | An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. |
![]() |
USN-5434-1 | Firefox vulnerabilities |
![]() |
USN-5435-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-04-16T15:19:47.119Z
Reserved: 2022-04-29T00:00:00.000Z
Link: CVE-2022-1529

Updated: 2024-08-03T00:10:03.467Z

Status : Modified
Published: 2022-12-22T20:15:13.327
Modified: 2025-04-16T16:15:20.683
Link: CVE-2022-1529


No data.